J2EE Instrumentation for software aging root cause application component determination with AspectJ

Size: px
Start display at page:

Download "J2EE Instrumentation for software aging root cause application component determination with AspectJ"

Transcription

1 J2EE Instrumentation for software aging root cause application component determination with AspectJ Javier Alonso Josep Ll. Berral Ricard Gavaldà Jordi Torres Technical University of Catalonia, Spain

2 Contents Motivation Our Contribution Preliminary concepts Architecture Root cause determination strategy Experimental Case Study Conclusion & Future work

3 Motivation New challenges are demanded by the society. Availability of the information At any time From everywhere Becoming in growing complexity day by day.

4 Motivation The growing complexity causes: Necessity for brilliant IT professionals. Increment of the Total owner Cost of the IT infrastructures. Increment of the faults/outages due to (directly or indirectly) the complexity.

5 Motivation These faults/outages have an important impact of the revenue of the companies: Around US$125,000 per hour, direct impact A part of the indirect impact Several studies show that the current system outages are more often due to software faults.

6 Motivation: Software Aging One of the most important reasons for software failures is the software aging phenomenon. The software aging Accumulation of errors, usually provoking resource contention during long running application Gradual performance degradation could also accompany software aging phenomena.

7 Motivation: Software Aging Software aging related with: Memory bloating/leaks Unterminated threads Data corruption Unreleased file-locks Overruns Potentially some of them together

8 Motivation: Software Aging The applications have to deal with software aging in production stage. The unaffordable and hardly cost task to avoid all software bugs. What is it the solution? Software rejuvenation

9 Motivation: Software Rejuvenation Software rejuvenation Basically, reboot the system, although there are most sophisticated techniques like microrebooting. There are two main strategies: Time based strategy. Proactive based strategy.

10 Motivation: Software Rejuvenation Time based strategies: Rejuvenation is applied regularly and periodically. Well-known used in web servers. Proactive based strategies: System metrics are monitored continuously The rejuvenation action is triggered when the system is near to the crash according to the system metrics.

11 Motivation: Software Rejuvenation The proactive approach is better because: We can reduce the rejuvenation actions The effectiveness of the proactive approach depends on the accuracy of the monitoring metrics.

12 Motivation: Root cause rejuvenation However, traditional monitoring tools understand the applications as black boxes. This fact makes impossible to know what the root cause of the software aging is. We understand as root cause the system component/s causing of the software aging.

13 Motivation: Root cause rejuvenation Monitoring tools do not offer enough clues about the root cause of failure. The most used rejuvenation mechanisms are based on rebooting or application restarting. Rebooting implies also a reduction of availability New more accurate techniques are proposed to reduce the Mean Time to Repair (MTTR), increasing the Availability. Availability =. MTTF. MTTF + MTTR

14 Motivation: Root cause rejuvenation Micro Rebooting Apply the recovery technique only over the component of the application that causes the failure. However, this technique needs a monitoring tool or detection mechanism that allow us to determinate the root cause of the failure.

15 Our Contribution We present a monitoring framework to help to determine the root cause of the software aging phenomena. Using technologies: Aspect Oriented Programming (AOP) Java Management Extensions (JMX) For J2EE infrastructures.

16 Our Contribution The idea: Monitoring the resources consumed by every software component of a J2EE application Monitoring the trend of the consumption Allowing to build a resource-component consumption map. All of all: Without modify the source code. With low overhead.

17 Our Contribution: Preliminary concepts Aspect Oriented Programming: Allows to isolate the main business logic of the application from secondary functions like logs or authentication. The core of AOP: Aspects. Aspects are composed by: Advices and Join Points. AOP allows to inject code in compile, load or runtime without to know the source code. We are injecting our observers using AOP

18 Our Contribution: Preliminary concepts Java Management Extensions: a set of capabilities to manage and monitor any system component: from devices to Java objects is based on a 3-level architecture: Probe level, Agent level and Remote Management Level.

19 Our Contribution: Architecture Aspect Component (AC) Associated to every application component. Manage the measurements of resource consumed and the trend. Aspect Component Proxy (AC-Proxy). creates a communication channel between the AC and the JMX Manager Agent JMX Monitoring Agents Access to the OS and collect system metrics for every component. JMX Manager Agent has the responsibility to collect the metrics of each component and build the resource-component map. Activate and deactivate ACs on demand. External Front-end allow administrators to communicate with the JMX Manager Agent in real time or activate new ACs or new JMX Monitor Agents.

20 Our Contribution: Architecture

21 Our Contribution: Root cause determination strategy The JMX Manager Agent has a responsibility to build resource-component map: The map is based on two axis: Component usage Resource consumption The map helps the engineers to priorize component repair

22 Our Contribution: Root cause determination strategy Component Usage Low Less Suspicious Component high Resource Consumption low Resource Consumption More Suspicious Component Component Usage High

23 Experimental Case Study We have used TPC-W J2EE application to evaluate of our approach. TPC-W simulates a on-line book store and uses Emulated Browsers (EBs) to simulate clients. The EBs calculate a thinking time to simulate the time used by a human to decide what will be his next step in the web. We have modified a set of TPC-W servlets to inject memory leaks at different ratios.

24 Experimental Case Study Overhead measurement: Around 5% of overhead.

25 Experimental Case Study Effectiveness to determine a memory leak: Only one component injects a memory leak (100Kb every injection):

26 Experimental Case Study Effectiveness to determine a memory leak: Four components inject a memory leak (100Kb every injection):

27 Experimental Case Study The map built in the last experiment was:

28 Experimental Case Study Effectiveness to determine a memory leak: Four components inject a memory leak (A = 100Kb every injection, B = 10KB, C and D = 1MB): A B C D

29 Experimental Case Study The map built in the last experiment was: Component Usage Low D high Resource Consumption low Resource Consumption C B A Component Usage High

30 Conclusion & Future work We have presented our framework and its utility and effectiveness to help to determine the root cause failure. We have focused on one type of software aging: memory leaks. The resource-component consumption could be an useful tool to help to determine the riskiest component We have to evaluate the effectiveness of that approach to determine other type of software aging due to different resources or even an interaction of more than one resource.

31 J2EE Instrumentation for software aging root cause application component determination with AspectJ Javier Alonso Josep Ll. Berral Ricard Gavaldà Jordi Torres Technical University of Catalonia, Spain

Adaptive on-line software aging prediction based on Machine Learning

Adaptive on-line software aging prediction based on Machine Learning Adaptive on-line software aging prediction based on Machine Learning Javier Alonso and Jordi Torres Barcelona Supercomputing Center Dept. of Computer Architecture Technical University of Catalonia {alonso,torres}@ac.upc.edu

More information

ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE

ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE ORACLE ENTERPRISE MANAGER 10g ORACLE DIAGNOSTICS PACK FOR NON-ORACLE MIDDLEWARE Most application performance problems surface during peak loads. Often times, these problems are time and resource intensive,

More information

Recovering Device Drivers

Recovering Device Drivers 1 Recovering Device Drivers Michael M. Swift, Muthukaruppan Annamalai, Brian N. Bershad, and Henry M. Levy University of Washington Presenter: Hayun Lee Embedded Software Lab. Symposium on Operating Systems

More information

Causes of Software Failures

Causes of Software Failures Causes of Software Failures Hardware Faults Permanent faults, e.g., wear-and-tear component Transient faults, e.g., bit flips due to radiation Software Faults (Bugs) (40% failures) Nondeterministic bugs,

More information

Reliability-Based Software Rejuvenation Scheduling for Cloud-Based Systems

Reliability-Based Software Rejuvenation Scheduling for Cloud-Based Systems 27th International Conference on Software Engineering and Knowledge Engineering Reliability-Based Software Rejuvenation Scheduling for Cloud-Based Systems Jean Rahme and Haiping Xu Computer and Information

More information

AppDynamics Lite vs. Pro Edition

AppDynamics Lite vs. Pro Edition An AppDynamics Datasheet AppDynamics Lite vs. Pro Edition AppDynamics, the leader in application performance management (APM) for the cloud generation, offers both a Lite and Pro edition of its monitoring

More information

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS

TUTORIAL: WHITE PAPER. VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS TUTORIAL: WHITE PAPER VERITAS Indepth for the J2EE Platform PERFORMANCE MANAGEMENT FOR J2EE APPLICATIONS 1 1. Introduction The Critical Mid-Tier... 3 2. Performance Challenges of J2EE Applications... 3

More information

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems. Robert Grimm University of Washington

Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems. Robert Grimm University of Washington Separating Access Control Policy, Enforcement, and Functionality in Extensible Systems Robert Grimm University of Washington Extensions Added to running system Interact through low-latency interfaces Form

More information

On the Way to ROC-2 (JAGR: JBoss + App-Generic Recovery)

On the Way to ROC-2 (JAGR: JBoss + App-Generic Recovery) On the Way to ROC-2 (JAGR: JBoss + App-Generic Recovery) George Candea and many others Stanford + Berkeley Outline J2EE and JBoss JBoss Additions JAGR µreboots Automatic Failure-Path Inference Self-Recovery

More information

Silk Performance Manager Installation and Setup Help

Silk Performance Manager Installation and Setup Help Silk Performance Manager 18.5 Installation and Setup Help Micro Focus The Lawn 22-30 Old Bath Road Newbury, Berkshire RG14 1QN UK http://www.microfocus.com Copyright 2004-2017 Micro Focus. All rights reserved.

More information

Nooks. Robert Grimm New York University

Nooks. Robert Grimm New York University Nooks Robert Grimm New York University The Three Questions What is the problem? What is new or different? What are the contributions and limitations? Design and Implementation Nooks Overview An isolation

More information

Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection

Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection 1 Testing Error Handling Code in Device Drivers Using Characteristic Fault Injection Jia-Ju Bai, Yu-Ping Wang, Jie Yin, Shi-Min Hu Department of Computer Science and Technology Tsinghua University Beijing,

More information

HARDFS: Hardening HDFS with Selective and Lightweight Versioning

HARDFS: Hardening HDFS with Selective and Lightweight Versioning HARDFS: Hardening HDFS with Selective and Lightweight Versioning Thanh Do, Tyler Harter, Yingchao Liu, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau Haryadi S. Gunawi 1 Cloud Reliability q Cloud

More information

What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices

What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices What You Corrupt Is Not What You Crash: Challenges in Fuzzing Embedded Devices Marius Muench 1 Jan Stijohann 2,3 Frank Kargl 3 Aurélien Francillon 1 Davide Balzarotti 1 1 EURECOM 2 Siemens AG 3 Ulm University

More information

Distributed Diagnosis of Failures in a Three Tier E-Commerce System. Motivation

Distributed Diagnosis of Failures in a Three Tier E-Commerce System. Motivation Distributed Diagnosis of Failures in a Three Tier E-ommerce System Gunjan Khanna, Ignacio Laguna, Fahad A. Arshad, and Saurabh agchi Dependable omputing Systems Lab (DSL) School of Electrical and omputer

More information

Advanced Memory Management

Advanced Memory Management Advanced Memory Management Main Points Applications of memory management What can we do with ability to trap on memory references to individual pages? File systems and persistent storage Goals Abstractions

More information

Oracle Java SE Advanced for ISVs

Oracle Java SE Advanced for ISVs Oracle Java SE Advanced for ISVs Oracle Java SE Advanced for ISVs is designed to enhance the Java based solutions that ISVs are providing to their enterprise customers. It brings together industry leading

More information

Virtuozzo Containers

Virtuozzo Containers Parallels Virtuozzo Containers White Paper An Introduction to Operating System Virtualization and Parallels Containers www.parallels.com Table of Contents Introduction... 3 Hardware Virtualization... 3

More information

Tolerating Hardware Device Failures in Software. Asim Kadav, Matthew J. Renzelmann, Michael M. Swift University of Wisconsin Madison

Tolerating Hardware Device Failures in Software. Asim Kadav, Matthew J. Renzelmann, Michael M. Swift University of Wisconsin Madison Tolerating Hardware Device Failures in Software Asim Kadav, Matthew J. Renzelmann, Michael M. Swift University of Wisconsin Madison Current state of OS hardware interaction Many device drivers assume device

More information

Oracle Database 10g The Self-Managing Database

Oracle Database 10g The Self-Managing Database Oracle Database 10g The Self-Managing Database Benoit Dageville Oracle Corporation benoit.dageville@oracle.com Page 1 1 Agenda Oracle10g: Oracle s first generation of self-managing database Oracle s Approach

More information

Dependable Grid Services: A Case Study with OGSA-DAI

Dependable Grid Services: A Case Study with OGSA-DAI Dependable Grid Services: A Case Study with OGSA-DAI Javier Alonso, Jordi Torres {alonso, torres}@ac.upc.edu Technical Univ. of Catalonia - Barcelona Supercomputing Center Barcelona - Spain Luis Moura

More information

Vertical Profiling: Understanding the Behavior of Object-Oriented Applications

Vertical Profiling: Understanding the Behavior of Object-Oriented Applications Vertical Profiling: Understanding the Behavior of Object-Oriented Applications Matthias Hauswirth, Amer Diwan University of Colorado at Boulder Peter F. Sweeney, Michael Hind IBM Thomas J. Watson Research

More information

Oracle Developer Studio Code Analyzer

Oracle Developer Studio Code Analyzer Oracle Developer Studio Code Analyzer The Oracle Developer Studio Code Analyzer ensures application reliability and security by detecting application vulnerabilities, including memory leaks and memory

More information

Combined Server Rejuvenation in a Virtualized Data Center

Combined Server Rejuvenation in a Virtualized Data Center Combined Server Rejuvenation in a Virtualized Data Center Fumio Machida, Jianwen Xiang, Kumiko Tadano, and Yoshiharu Maeno NEC Knowledge Discovery Research Laboratories Kawasaki, Japan {f-machida@ab, j-xiang@ah,

More information

FAULT TOLERANT SYSTEMS

FAULT TOLERANT SYSTEMS FAULT TOLERANT SYSTEMS http://www.ecs.umass.edu/ece/koren/faulttolerantsystems Part 14 - Software Fault Tolerance I Chapter 4 Software Fault Tolerance Part.14.1 Causes of Software Errors Designing and

More information

DEPENDABLE GRID SERVICES: A CASE STUDY WITH OGSA-DAI

DEPENDABLE GRID SERVICES: A CASE STUDY WITH OGSA-DAI DEPENDABLE GRID SERVICES: A CASE STUDY WITH OGSA-DAI Javier Alonso and Jordi Torres Technical University of Catalonia Barcelona Supercomputing Center, Barcelona,Spain alonso@ac.upc.edu torres@ac.upc.edu

More information

Synopsis by: Stephen Roberts, GMU CS 895, Spring 2013

Synopsis by: Stephen Roberts, GMU CS 895, Spring 2013 Using Components for Architecture-Based Management The Self-Repair case Sylvain Sicard Université Joseph Fourier, Grenoble, France, Fabienne Boyer Université Joseph Fourier, Grenoble, France, Noel De Palma

More information

CSE 124: Networked Services Lecture-15

CSE 124: Networked Services Lecture-15 Fall 2010 CSE 124: Networked Services Lecture-15 Instructor: B. S. Manoj, Ph.D http://cseweb.ucsd.edu/classes/fa10/cse124 11/18/2010 CSE 124 Networked Services Fall 2010 1 Updates Signup sheet for PlanetLab

More information

Authors : Ruslan Nikolaev Godmar Back Presented in SOSP 13 on Nov 3-6, 2013

Authors : Ruslan Nikolaev Godmar Back Presented in SOSP 13 on Nov 3-6, 2013 VirtuOS: An operating sytem with kernel virtualization Authors : Ruslan Nikolaev Godmar Back Presented in SOSP 13 on Nov 3-6, 2013 Presentation by Bien Aime MUGABARIGIRA Process Isolation and protection

More information

CISCO IOS WARM RELOAD & WARM UPGRADE

CISCO IOS WARM RELOAD & WARM UPGRADE CISCO IOS WARM RELOAD & WARM UPGRADE INTERNET TECHNOLOGIES DIVISION SEPTEMBER 2004 1 High Availability Business depends on anywhere, anytime access to the systems, data, and applications Customers cite

More information

Cost-Based Automatic Recovery Policy in Data Centers

Cost-Based Automatic Recovery Policy in Data Centers Cost-Based Automatic Recovery Policy in Data Centers by Yi Luo A thesis presented to the University of Waterloo in fulfilment of the thesis requirement for the degree of Master of Applied Science in Electrical

More information

Plasmon Diamond Library Manager

Plasmon Diamond Library Manager Plasmon Diamond Library Manager Release Details Product Release Notes Release Name: Diamond Library Manager Release Note Number: Note091 Release Version: 2.09.31 Release Date: 1 st July 2005 Release Type:

More information

Barry D. Lamkin Executive IT Specialist Capitalware's MQ Technical Conference v

Barry D. Lamkin Executive IT Specialist Capitalware's MQ Technical Conference v What happened to my Transaction? Barry D. Lamkin Executive IT Specialist blamkin@us.ibm.com Transaction Tracking - APM Transaction Tracking is a major part of Application Performance Monitoring To ensure

More information

Project 0: Implementing a Hash Table

Project 0: Implementing a Hash Table Project : Implementing a Hash Table CS, Big Data Systems, Spring Goal and Motivation. The goal of Project is to help you refresh basic skills at designing and implementing data structures and algorithms.

More information

ArcGIS Server Performance and Scalability : Optimizing GIS Services

ArcGIS Server Performance and Scalability : Optimizing GIS Services Esri International User Conference San Diego, CA Technical Workshops July 12, 2011 ArcGIS Server Performance and Scalability : Optimizing GIS Services David Cordes, Eric Miller Poll the Audience: Role

More information

Exploiting IT Log Analytics to Find and Fix Problems Before They Become Outages

Exploiting IT Log Analytics to Find and Fix Problems Before They Become Outages Exploiting IT Log Analytics to Find and Fix Problems Before They Become Outages Clyde Richardson (richarcl@us.ibm.com) Technical Sales Specialist Sarah Knowles (seli@us.ibm.com) Strategy and Portfolio

More information

JiST Java in Simulation Time An efficient, unifying approach to simulation using virtual machines

JiST Java in Simulation Time An efficient, unifying approach to simulation using virtual machines JiST Java in Simulation Time An efficient, unifying approach to simulation using virtual machines Rimon Barr, Zygmunt Haas, Robbert van Renesse rimon@acm.org haas@ece.cornell.edu rvr@cs.cornell.edu. Cornell

More information

Technical Brief. A Checklist for Every API Call. Managing the Complete API Lifecycle

Technical Brief. A Checklist for Every API Call. Managing the Complete API Lifecycle Technical Brief A Checklist for Table of Contents Introduction: The API Lifecycle 2 3 Security professionals API developers Operations engineers API product or business owners Apigee Edge 7 A Checklist

More information

Software Error Early Detection System based on Run-time Statistical Analysis of Function Return Values

Software Error Early Detection System based on Run-time Statistical Analysis of Function Return Values Software Error Early Detection System based on Run-time Statistical Analysis of Function Return Values Alex Depoutovitch and Michael Stumm Department of Computer Science, Department Electrical and Computer

More information

2. PICTURE: Cut and paste from paper

2. PICTURE: Cut and paste from paper File System Layout 1. QUESTION: What were technology trends enabling this? a. CPU speeds getting faster relative to disk i. QUESTION: What is implication? Can do more work per disk block to make good decisions

More information

MemRed: Towards Reliable Web Applications

MemRed: Towards Reliable Web Applications MemRed: Towards Reliable Web Applications Masoomeh Rudafshani University of Waterloo mrudafsh@uwaterloo.ca Paul A.S. Ward University of Waterloo pasward@uwaterloo.ca Bernard Wong University of Waterloo

More information

Monitoring the eg Manager. eg Enterprise v6

Monitoring the eg Manager. eg Enterprise v6 Monitoring the eg Manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced

More information

Service Delivery Platform

Service Delivery Platform Solution Brief Service Delivery Platform Enabling the transition to high-value and more differentiated network services with new consumption models for deploying VNFs. Keeping Up With Cloud Expectations

More information

4 Effective Tools for Docker Monitoring. By Ranvijay Jamwal

4 Effective Tools for Docker Monitoring. By Ranvijay Jamwal 4 Effective Tools for Docker Monitoring By Ranvijay Jamwal CONTENT 1. The need for Container Technologies 2. Introduction to Docker 2.1. What is Docker? 2.2. Why is Docker popular? 2.3. How does a Docker

More information

Port Tapping Session 2 Race tune your infrastructure

Port Tapping Session 2 Race tune your infrastructure Port Tapping Session 2 Race tune your infrastructure Born on Oct 30 th 2012. 2 3 Tap Module Red adapter indicates TAP port 4 Corning Fibre Channel and Ethernet Tap s 72 Ports per 1U 288 Ports per 4U 5

More information

Agilent 53210A 350 MHz RF Counter Agilent 53220A 350 MHz Universal Frequency Counter/Timer Agilent 53230A 350 MHz Universal Frequency Counter/Timer

Agilent 53210A 350 MHz RF Counter Agilent 53220A 350 MHz Universal Frequency Counter/Timer Agilent 53230A 350 MHz Universal Frequency Counter/Timer Agilent 53210A 350 MHz RF Counter Agilent 53220A 350 MHz Universal Frequency Counter/Timer Agilent 53230A 350 MHz Universal Frequency Counter/Timer Firmware Update 2.01 Release Notes 53210A/53220A/53230A

More information

Differentiated Quality of Service for e-commerce Applications through Connection Scheduling based on System-Level Thread Priorities

Differentiated Quality of Service for e-commerce Applications through Connection Scheduling based on System-Level Thread Priorities Differentiated Quality of Service for e-commerce Applications through Connection Scheduling based on System-Level Thread Priorities Javier Alonso alonso@ac.upc.edu Jordi Guitart jguitart@ac.upc.edu Jordi

More information

sfcb Small Footprint Cim Broker Introduction

sfcb Small Footprint Cim Broker Introduction sfcb Small Footprint Cim Broker Introduction Adrian Schuur schuur@de.ibm.com May 2005 LTC Systems Management 2 Contents Simple questions: Why? What? How? A Picture and Terminology used Detailed description

More information

ManageEngine Applications Manager 9. Product Features

ManageEngine Applications Manager 9. Product Features ManageEngine Applications Manager 9 Product Features Applications Manager - The Solution Applications Manager Monitors your entire IT infrastructure including applications, servers, databases, operating

More information

RELEASE NOTES FOR THE Kinetic - Edge & Fog Processing Module (EFM) RELEASE 1.2.0

RELEASE NOTES FOR THE Kinetic - Edge & Fog Processing Module (EFM) RELEASE 1.2.0 RELEASE NOTES FOR THE Kinetic - Edge & Fog Processing Module (EFM) RELEASE 1.2.0 Revised: November 30, 2017 These release notes provide a high-level product overview for the Cisco Kinetic - Edge & Fog

More information

AdventNet ManageEngine. Business Specific Application Management Solutions

AdventNet ManageEngine. Business Specific Application Management Solutions AdventNet ManageEngine. Business Specific Application Management Solutions Levels of Application Management Business/application Specific Management Information Business Oriented Management Application

More information

Monitoring and Managing Computer Resource Usage on OSGi Frameworks

Monitoring and Managing Computer Resource Usage on OSGi Frameworks Monitoring and Managing Computer Resource Usage on OSGi Frameworks Ikuo YAMASAKI Research Engineer NTT Cyber Solution Laboratories Background: Service Aggregation Platform Operation Center and Home Service

More information

Aspects and Soar: A Behavior Development Model. Jacob Crossman

Aspects and Soar: A Behavior Development Model. Jacob Crossman Aspects and Soar: A Behavior Development Model Jacob Crossman jcrossman@soartech.com Motivation: Why is Soar Useful? Soar Systems are often complex Often require multiple processes Are built of hundreds/thousands

More information

IMPROVING THE RELIABILITY OF OPTICAL NETWORKS AN ALCATEL-LUCENT PROFESSIONAL SERVICE USING NETWORKMINING SOFTWARE

IMPROVING THE RELIABILITY OF OPTICAL NETWORKS AN ALCATEL-LUCENT PROFESSIONAL SERVICE USING NETWORKMINING SOFTWARE IMPROVING THE RELIABILITY OF OPTICAL NETWORKS AN ALCATEL-LUCENT PROFESSIONAL SERVICE USING NETWORKMINING SOFTWARE Application Note Abstract Alcatel-Lucent has established a partnership with NetworkMining

More information

Unifying Agent and Component Concepts - Jadex Active Components

Unifying Agent and Component Concepts - Jadex Active Components Unifying Agent and Component Concepts - Jadex Active Components Alexander Pokahr, Lars Braubach, Kai Jander Distributed Systems and Information Systems Group (VSIS) Department of Informatics, University

More information

Performance Evaluation of Virtualization Technologies

Performance Evaluation of Virtualization Technologies Performance Evaluation of Virtualization Technologies Saad Arif Dept. of Electrical Engineering and Computer Science University of Central Florida - Orlando, FL September 19, 2013 1 Introduction 1 Introduction

More information

Adaptive Instrumentation of Java-Applications for Experiment-Based Performance Analysis

Adaptive Instrumentation of Java-Applications for Experiment-Based Performance Analysis Adaptive Instrumentation of Java-Applications for Experiment-Based Performance Analysis Henning Schulz, Albert Flaig, Alexander Wert and André van Hoorn Symposium on Software Performance 2014 28.11.2014

More information

A Practical Approach to Balancing Application Performance and Instrumentation Information Using Symantec i 3 for J2EE

A Practical Approach to Balancing Application Performance and Instrumentation Information Using Symantec i 3 for J2EE WHITE PAPER: APPLICATION CUSTOMIZE PERFORMANCE MANAGEMENT Confidence in a connected world. A Practical Approach to Balancing Application Performance and Instrumentation Information Using Symantec i 3 for

More information

Analysis of Derby Performance

Analysis of Derby Performance Analysis of Derby Performance Staff Engineer Olav Sandstå Senior Engineer Dyre Tjeldvoll Sun Microsystems Database Technology Group This is a draft version that is subject to change. The authors can be

More information

ORACLE WEBLOGIC SERVER 10g R3 ENTERPRISE EDITION

ORACLE WEBLOGIC SERVER 10g R3 ENTERPRISE EDITION ORACLE WEBLOGIC SERVER 10g R3 ENTERPRISE EDITION KEY FEATURES FEATURES High performance clustering and failover capabilities Low-overhead Java application monitoring and diagnostics Flexible download and

More information

Inside WebSphere Application Server

Inside WebSphere Application Server Inside WebSphere Application Server The anatomy of WebSphere Application Server is quite detailed so, for now, let's briefly outline some of the more important parts. The following diagram shows the basic

More information

Performance Metrics for.net: Application Defender

Performance Metrics for.net: Application Defender White Paper Security Performance Metrics for.net: Application Defender Table of Contents page Abstract... 1 Results... 4 Abstract For every IT person, understanding the performance impact of adding a new

More information

HP Business Service Management

HP Business Service Management HP Business Service Management Software Version: 9.26 Getting Started With BPM - Best Practices Document Release Date: September 2015 Software Release Date: September 2015 Legal Notices Warranty The only

More information

J2EE DIAGNOSING J2EE PERFORMANCE PROBLEMS THROUGHOUT THE APPLICATION LIFECYCLE

J2EE DIAGNOSING J2EE PERFORMANCE PROBLEMS THROUGHOUT THE APPLICATION LIFECYCLE DIAGNOSING J2EE PERFORMANCE PROBLEMS THROUGHOUT THE APPLICATION LIFECYCLE ABSTRACT Many large-scale, complex enterprise applications are now built and deployed using the J2EE architecture. However, many

More information

Unified Management for Virtual Storage

Unified Management for Virtual Storage Unified Management for Virtual Storage Storage Virtualization Automated Information Supply Chains Contribute to the Information Explosion Zettabytes Information doubling every 18-24 months Storage growing

More information

Portland State University ECE 587/687. Virtual Memory and Virtualization

Portland State University ECE 587/687. Virtual Memory and Virtualization Portland State University ECE 587/687 Virtual Memory and Virtualization Copyright by Alaa Alameldeen and Zeshan Chishti, 2015 Virtual Memory A layer of abstraction between applications and hardware Programs

More information

Diagnostics in Testing and Performance Engineering

Diagnostics in Testing and Performance Engineering Diagnostics in Testing and Performance Engineering This document talks about importance of diagnostics in application testing and performance engineering space. Here are some of the diagnostics best practices

More information

Crestron RL Release Notes

Crestron RL Release Notes Page 1 of 8 Crestron RL Release Notes Crestron RL Version History Version 15.11.00 Version 15.10.00 Version 15.09 Version 15.08 Version 15.05 Version 15.04 Version 15.03 Version 15.02 Version 15.11.00

More information

Autonomic Web-based Simulation

Autonomic Web-based Simulation Autonomic Web-based Simulation Yingping Huang and Gregory Madey Computer Science and Engineering University of Notre Dame Autonomic Web-based Simulation p.1/38 Autonomic Web-based Simulation Autonomic

More information

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7

Release Notes for Epilog for Windows Release Notes for Epilog for Windows v1.7 Release Notes for Epilog for Windows v1.7 InterSect Alliance International Pty Ltd Page 1 of 16 About this document This document provides release notes for Snare Enterprise Epilog for Windows release.

More information

Speculative Synchronization: Applying Thread Level Speculation to Parallel Applications. University of Illinois

Speculative Synchronization: Applying Thread Level Speculation to Parallel Applications. University of Illinois Speculative Synchronization: Applying Thread Level Speculation to Parallel Applications José éf. Martínez * and Josep Torrellas University of Illinois ASPLOS 2002 * Now at Cornell University Overview Allow

More information

P17 System Testing Monday, September 24, 2007

P17 System Testing Monday, September 24, 2007 IBM Software Group P17 System Testing Monday, September 24, 2007 Module 8 : IBM Rational Testing Solutions Marty Swafford IBM Rational Software IBM Certified Solution Designer - Rational Manual Tester,

More information

Undermining Information Hiding (And What to do About it)

Undermining Information Hiding (And What to do About it) Undermining Information Hiding (And What to do About it) Enes Göktaş, Robert Gawlik, Benjamin Kollenda, Elias Athanasopoulos, Georgios Portokalidis, Cristiano Giuffrida, Herbert Bos Overview Mitigating

More information

Understanding, Analyzing and Forecasting Capacity First Published On: Last Updated On:

Understanding, Analyzing and Forecasting Capacity First Published On: Last Updated On: Understanding, Analyzing and Forecasting Capacity First Published On: 04-19-2017 Last Updated On: 04-19-2017 1 Table of Contents 1. Analyzing and Forecasting 1.1.vROps - Reclaimable Capacity Analysis Badge

More information

Essential Features of an Integration Solution

Essential Features of an Integration Solution Essential Features of an Integration Solution September 2017 WHITE PAPER Essential Features of an Integration Solution When an enterprise uses multiple applications, it needs to connect them for a variety

More information

Quest Central for DB2

Quest Central for DB2 Quest Central for DB2 INTEGRATED DATABASE MANAGEMENT TOOLS Supports DB2 running on Windows, Unix, OS/2, OS/390 and z/os Integrated database management components are designed for superior functionality

More information

Project 0: Implementing a Hash Table

Project 0: Implementing a Hash Table CS: DATA SYSTEMS Project : Implementing a Hash Table CS, Data Systems, Fall Goal and Motivation. The goal of Project is to help you develop (or refresh) basic skills at designing and implementing data

More information

Operating Systems. File Systems. Thomas Ropars.

Operating Systems. File Systems. Thomas Ropars. 1 Operating Systems File Systems Thomas Ropars thomas.ropars@univ-grenoble-alpes.fr 2017 2 References The content of these lectures is inspired by: The lecture notes of Prof. David Mazières. Operating

More information

GlassFish Monitoring with JMX, Jconsole, Glassbox and AMX

GlassFish Monitoring with JMX, Jconsole, Glassbox and AMX GlassFish Monitoring with JMX, Jconsole, Glassbox and AMX Sun Community Days Sydney, Australia 06 March 2008 Chris Fleischmann Sun Microsystems, Inc. 1 Agenda GlassFish Monitoring OOTB JConsole and JMX

More information

Module 4 STORAGE NETWORK BACKUP & RECOVERY

Module 4 STORAGE NETWORK BACKUP & RECOVERY Module 4 STORAGE NETWORK BACKUP & RECOVERY BC Terminology, BC Planning Lifecycle General Conditions for Backup, Recovery Considerations Network Backup, Services Performance Bottlenecks of Network Backup,

More information

WEB-CAT. Exploring Trends and Student Behaviors from Data Collected on an Automated Grading and Testing System

WEB-CAT. Exploring Trends and Student Behaviors from Data Collected on an Automated Grading and Testing System Exploring Trends and Student Behaviors from Data Collected on an Automated Grading and Testing System WEB-CAT Tony Allevato, Stephen Edwards allevato@vt.edu, edwards@cs.vt.edu Virginia Tech Department

More information

VERIFYING SOFTWARE ROBUSTNESS. Ross Collard Collard & Company

VERIFYING SOFTWARE ROBUSTNESS. Ross Collard Collard & Company VERIFYING SOFTWARE ROBUSTNESS Ross Collard Collard & Company OVERVIEW Software is robust if it can tolerate such problems as unanticipated events, invalid inputs, corrupted internally stored data, improper

More information

Appendix D: Storage Systems

Appendix D: Storage Systems Appendix D: Storage Systems Instructor: Josep Torrellas CS433 Copyright Josep Torrellas 1999, 2001, 2002, 2013 1 Storage Systems : Disks Used for long term storage of files temporarily store parts of pgm

More information

Designing API: 20 API Paradoxes. Jaroslav Tulach NetBeans Platform Architect

Designing API: 20 API Paradoxes. Jaroslav Tulach NetBeans Platform Architect Designing API: 20 API Paradoxes Jaroslav Tulach NetBeans Platform Architect Motto Just like there is a difference between describing a house and describing a Universe, there is a difference between writing

More information

Getting it Right: Testing Storage Arrays The Way They ll be Used

Getting it Right: Testing Storage Arrays The Way They ll be Used Getting it Right: Testing Storage Arrays The Way They ll be Used Peter Murray Virtual Instruments Flash Memory Summit 2017 Santa Clara, CA 1 The Journey: How Did we Get Here? Storage testing was black

More information

Availability & Resource

Availability & Resource Achieving Cost-effective High Availability & Resource Management Agenda Virtual Infrastructure Stack How Vmware helps in the Data Center Availability and Resource Management 2 The VMware Virtual Infrastructure

More information

Help your Cisco customers defend against downtime and reduce costs

Help your Cisco customers defend against downtime and reduce costs Help your Cisco customers defend against downtime and reduce costs Why and when to sell Eaton Power Management solutions Incorporating power management with Cisco solutions boosts your sales revenue, while

More information

Resilient Virtualized Systems Using ReHype

Resilient Virtualized Systems Using ReHype UCLA Computer Science Department Technical Report #140019 University of California, Los Angeles, October 2014. Resilient Virtualized Systems Using ReHype Michael Le and Yuval Tamir Concurrent Systems Laboratory

More information

Internet Services and Search Engines. Amin Vahdat CSE 123b May 2, 2006

Internet Services and Search Engines. Amin Vahdat CSE 123b May 2, 2006 Internet Services and Search Engines Amin Vahdat CSE 123b May 2, 2006 Midterm: May 9 Annoucements Second assignment due May 15 Lessons from Giant-Scale Services Service Replication Service Partitioning

More information

Fault-Tolerant Storage and Implications for the Cloud Charles Snyder

Fault-Tolerant Storage and Implications for the Cloud Charles Snyder Fault-Tolerant Storage and Implications for the Cloud Charles Snyder Abstract Fault-tolerance is an essential aspect of any storage system data must be correctly preserved and transmitted in order to be

More information

THE phenomenon that the state of running software

THE phenomenon that the state of running software TRANSACTION ON DEPENDABLE AND SECURE COMPUTING 1 Fast Software Rejuvenation of Virtual Machine Monitors Kenichi Kourai, Member, IEEE Computer Society, and Shigeru Chiba Abstract As server consolidation

More information

Technical Improvements and future directions for ecollection and multimodal data capture in the Australian Bureau of Statistics (ABS)

Technical Improvements and future directions for ecollection and multimodal data capture in the Australian Bureau of Statistics (ABS) Technical Improvements and future directions for ecollection and multimodal data capture in the Australian Bureau of Statistics (ABS) Monica Kempster Assistant Director Blaise Operations Manager Technical

More information

CISQ Weakness Descriptions

CISQ Weakness Descriptions CISQ Weakness Descriptions This document presents descriptions of the 86 weaknesses contained in the 4 CISQ Quality Characteristic measures. These descriptions have been simplified from their description

More information

How To Keep Your Head Above Water While Detecting Errors

How To Keep Your Head Above Water While Detecting Errors USENIX / ACM / IFIP 10th International Middleware Conference How To Keep Your Head Above Water While Detecting Errors Ignacio Laguna, Fahad A. Arshad, David M. Grothe, Saurabh Bagchi Dependable Computing

More information

A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines

A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines A Fast Rejuvenation Technique for Server Consolidation with Virtual Machines Kenichi Kourai Tokyo Institute of Technology 2-12-1 Ookayama, Meguro-ku, Tokyo 152-8552, Japan kourai@is.titech.ac.jp Shigeru

More information

MEMBRANE: OPERATING SYSTEM SUPPORT FOR RESTARTABLE FILE SYSTEMS

MEMBRANE: OPERATING SYSTEM SUPPORT FOR RESTARTABLE FILE SYSTEMS Department of Computer Science Institute of System Architecture, Operating Systems Group MEMBRANE: OPERATING SYSTEM SUPPORT FOR RESTARTABLE FILE SYSTEMS SWAMINATHAN SUNDARARAMAN, SRIRAM SUBRAMANIAN, ABHISHEK

More information

Memory management. the CPU cannot be divided into smaller pieces and has to be given to a process as one unit (sharing is solely temporal).

Memory management. the CPU cannot be divided into smaller pieces and has to be given to a process as one unit (sharing is solely temporal). Memory management It is possible to assign a separate memory chip to each process in the system, if the number of processes is small enough. This is not a cost effective way to spend money: as the number

More information

6.033 Lecture Fault Tolerant Computing 3/31/2014

6.033 Lecture Fault Tolerant Computing 3/31/2014 6.033 Lecture 14 -- Fault Tolerant Computing 3/31/2014 So far what have we seen: Modularity RPC Processes Client / server Networking Implements client/server Seen a few examples of dealing with faults

More information

Swapping. Operating Systems I. Swapping. Motivation. Paging Implementation. Demand Paging. Active processes use more physical memory than system has

Swapping. Operating Systems I. Swapping. Motivation. Paging Implementation. Demand Paging. Active processes use more physical memory than system has Swapping Active processes use more physical memory than system has Operating Systems I Address Binding can be fixed or relocatable at runtime Swap out P P Virtual Memory OS Backing Store (Swap Space) Main

More information

AlwaysOn Availability Groups: Backups, Restores, and CHECKDB

AlwaysOn Availability Groups: Backups, Restores, and CHECKDB AlwaysOn Availability Groups: Backups, Restores, and CHECKDB www.brentozar.com sp_blitz sp_blitzfirst email newsletter videos SQL Critical Care 2016 Brent Ozar Unlimited. All rights reserved. 1 What I

More information